Impact
A vulnerability in Cisco Unified Communications Manager and related products allows an attacker to send crafted HTTP requests to the web management interface. The flaw arises from improper validation of user-supplied input, enabling arbitrary command execution on the underlying operating system. A successful exploit can yield user-level access and privilege escalation to root, compromising confidentiality, integrity, and availability.
Affected Systems
Cisco Unified Communications Manager (including Unified CM Session Management Edition and IM & Presence Service), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance. Specific affected versions are not listed in the advisory; any installed instance of these products is potentially vulnerable.
Risk and Exploitability
The CVSS base score of 8.2 indicates high severity, while an EPSS score of 4% reflects a low but non-zero likelihood of exploitation. Listed in the CISA KEV catalog, the vulnerability has been demonstrated or exploited. Attackers can remotely, unauthenticated, exploit the web interface by sending crafted requests, leading to arbitrary code execution and privilege escalation.
OpenCVE Enrichment